Author of the publication

A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites.

, , , , and . ACSAC, page 89-100. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A CMOS image sensor for focal plane decomposition., , , , and . ISCAS (5), page 5322-5325. IEEE, (2005)Preventing Cryptographic Key Leakage in Cloud Virtual Machines., , , and . USENIX Security Symposium, page 703-718. USENIX Association, (2014)Automatic Uncovering of Tap Points from Kernel Executions., , and . RAID, volume 9854 of Lecture Notes in Computer Science, page 49-70. Springer, (2016)Automatically deriving pointer reference expressions from binary code for memory dump analysis., , and . ESEC/SIGSOFT FSE, page 614-624. ACM, (2015)Characterizing kernel malware behavior with kernel data access patterns., , and . AsiaCCS, page 207-216. ACM, (2011)On the (In)security of Bluetooth Low Energy One-Way Secure Connections Only Mode., , , , , and . CoRR, (2019)A Method of Human Skin Region Detection Based on PCNN., , , and . ISNN (3), volume 5553 of Lecture Notes in Computer Science, page 486-493. Springer, (2009)A Hybrid Design of Linkable Ring Signature Scheme with Stealth Addresses., , and . Secur. Commun. Networks, (2022)Don't Leak Your Keys: Understanding, Measuring, and Exploiting the AppSecret Leaks in Mini-Programs., , and . CCS, page 2411-2425. ACM, (2023)SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors., , , and . CCS, page 1211-1228. ACM, (2017)